22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

438 Lotus Security Handbook<br />

Run simple and formula agents<br />

Enter the names of users and groups allowed to run simple and formula agents,<br />

both private and shared. Leave the field blank to allow all users and groups to<br />

run simple and formula agents, both private and shared.<br />

Sign script libraries to run on behalf of someone else<br />

Enter the names of users and groups who are allowed to sign script libraries in<br />

agents executed by someone else. For the purposes of backwards compatibility,<br />

the default value is to leave the field empty, to allow all.<br />

11.1.5 Policies and policy documents<br />

New for<br />

Domino 6<br />

Policies let you control how users work with Notes. A policy is a document that<br />

identifies a collection of individual policy settings documents. Each of these<br />

policy settings documents defines a set of defaults that apply to the users and<br />

groups to which the policy is assigned. Once a policy is in place, you can easily<br />

change a setting, and it will automatically apply to those users to whom the policy<br />

is assigned.<br />

Domino policies should not be confused with corporate security policies. A<br />

corporate security policy is a set of guidelines and standards used in an<br />

organization to establish and enforce secure information practices.<br />

For more information on organizational security polices, see Chapter 2, “Security<br />

methodologies” on page 43.<br />

You create policy settings documents for these administrative areas:<br />

► Registration: Set default user registration values including user password,<br />

Internet address format, roaming user designation, and mail.<br />

► Setup: These settings are used during the initial Notes client setup to<br />

populate the user's Location document. Setup settings include Internet<br />

browser and proxy settings, applet security settings, and desktop and user<br />

preferences.<br />

► Desktop: Control and update the user's desktop environment or reinforce<br />

setup policy settings. For example, if a change is made to any of the policy<br />

settings, the next time users authenticate with their home server, the desktop<br />

policy settings restore the default settings or distribute new settings specified<br />

in the desktop policy settings document.<br />

► Mail archiving: Control mail archiving. Archive settings control where<br />

archiving is performed and specify archive criteria.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!